Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario

Jasleen Kaur1, Alka Agrawal1, Raees Ahmad Khan1
1Department of Information Technology, BBA University, Lucknow, India

Tài liệu tham khảo

Albouq, 2020, A double obfuscation approach for protecting the privacy of IoT location based applications, IEEE Access, 8, 129415, 10.1109/ACCESS.2020.3009200 Alzoubi, 2021, Fog computing security and privacy issues, open challenges, and blockchain solution: an overview, Int. J. Elec. Comput. Eng., 11 Amuthan, 2020, Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing, J. Ambient Intell. Hum. Comput., 11, 5217, 10.1007/s12652-020-01849-8 Bonomi, 2012, August). Fog computing and its role in the internet of things, 13 Chen, 2016, Preserving user location privacy for location-based service, 290 ‘How Intel’s Homomorphic Encryption Can Process Ciphertext’. Available online: https://cisomag.eccouncil.org/homomorphic-encryption-standard/ Accessed on: 17 January 2022. Dang, 2019, A survey on internet of things and cloud computing for healthcare, Electronics, 8, 768, 10.3390/electronics8070768 Desai, 2021, Security and privacy issues in fog computing for healthcare 4.0, 291 Duckham, 2005, A formal model of obfuscation and negotiation for location privacy, 152 Elkhodr, 2013, A contextual-adaptive location disclosure agent for general devices in the internet of things, 848 ‘Understanding Time Complexity with Simple Examples’ Available online: https://www.geeksforgeeks.org/understanding-time-complexity-simple-examples/ Accessed on: 17 January 2022. ‘IAMAI Kantar ICUBE, Report’ https://www.iamai.in/KnowledgeCentre 2020 Available at: Accessed on: 11 October 2021. Jain, 2020, A comparative study of location privacy preservation in the internet of things, Proc. Comput. Sci., 171, 1760, 10.1016/j.procs.2020.04.189 Javadzadeh, 2020, Fog computing applications in smart cities: a systematic survey, Wireless Netw., 26, 1433, 10.1007/s11276-019-02208-y Kachore, 2015, Location obfuscation for location data privacy, 213 Kaur, 2020, Security issues in fog environment: a systematic literature review, Int. J. Wireless Inf. Networks, 27, 467, 10.1007/s10776-020-00491-7 Kaur, 2021, Importance of fog computing in healthcare 4.0, 79 Lee, 2015, On security and privacy issues of fog computing supported Internet of Things environment, 1 MATLAB. Available online: http://www.mathworks.com Accessed on: 11 October 2021. Min, 2020, Tools and techniques for privacy-aware, edge-centric distributed deep learning, 7 Monikandan, 2015, Confidentiality technique to enhance security of data in public cloud storage using data obfuscation, Ind. J. Sci. Technol., 8, 1 Mukherjee, 2017, Security and privacy in fog computing: challenges, IEEE Access, 5, 19293, 10.1109/ACCESS.2017.2749422 Naik, 2019, Location privacy using data obfuscation in fog computing, 1286 Puliafito, 2017, Fog computing for the internet of mobile things: issues and challenges, 1 Puri, 2020, Data anonymization for privacy protection in fog-enhanced smart homes, 201 Razaq, 2021, Privacy-aware collaborative task offloading in fog computing, IEEE Trans. Comput. Social Syst. Ullah, 2018, ESOT: A new privacy model for preserving location privacy in Internet of Things, Telecommun. Systems, 67, 553, 10.1007/s11235-017-0352-x Verma, 2019, Security and privacy issues in fog driven IoT environment, Int. J. Comput. Sci. Eng., 7, 367 Verma, 2021, Interval-valued intuitionistic fuzzy-analytic hierarchy process for evaluating the impact of security attributes in fog based internet of things paradigm, Comput. Commun., 175, 35, 10.1016/j.comcom.2021.04.019 Verma, 2021, A systematic survey on fog steered IoT: architecture, prevalent threats and trust models, Int. J. Wireless Inf. Networks, 28, 116, 10.1007/s10776-020-00499-z Yazici, 2018, Edge machine learning: enabling smart internet of things applications, Big Data Cognitive Comput., 2, 26, 10.3390/bdcc2030026 Yi, 2015, Security and privacy issues of fog computing: a survey, 685